On Tue, May 28, 2024 at 09:32:29PM -0400, John Hill via Postfix-users wrote:

> On 5/28/24 9:23 PM, Viktor Dukhovni via Postfix-users wrote:
> >    -o { smtpd_recipient_restrictions =
> >              reject_rbl_client zen.spamhaus.org=127.0.0.4,
> >              reject_sender_login_mismatch,
> >              permit_sasl_authenticated,
> >              reject }
> 
> 
> I had experimented and came close to this.
> 
> I will use it.
> 
> Question as I use zen 127.0.0.[2..11] on port 25

This is includes the PBL, covering much of the "dynamic" ISP consumer
address space, including homes, hotels, airports, ...  You probably
don't want to block these.  The XBL (127.0.0.4) is a conservative
choice.  You might in fact want to reject XBL IPs early, before they
even attempt authentication.  So I have:

    465        inet  n       -       n       -       -       smtpd
        -o smtpd_delay_reject=no
        -o {smtpd_client_restrictions=reject_rbl_client 
zen.spamhaus.org=127.0.0.4}
        -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
        ...

    submission inet  n       -       n       -       -       smtpd
        -o smtpd_delay_reject=no
        -o {smtpd_client_restrictions=reject_rbl_client 
zen.spamhaus.org=127.0.0.4}
        -o 
smtpd_relay_restrictions=permit_sasl_authenticated,permit_mynetworks,reject

(The "permit_mynetworks" is for a couple of machine-to-machine submission use 
cases).

-- 
    Viktor.
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to